ENTER SUBJECT
Got essays up the wazoo? Then you have found the right site. With over 45,000 essays, reports, and papers in our database, we are the
busy student's best friend. Get instant access and download all the essays you will ever need for one low price! Don't wait any longer...
that essay isn't going to write itself. So click the button below and join today.
Here is a free sample excerpt of the essay
Hackers
Part I of Essay
Introduction . . . . . . . . . . . . . . . . . . . 1
Methodology . . . . . . . . . . . . . . . . . . . 6
What is the Computer Underground? . . . . . . . . 11
Topography of the Computer Underground . . . . . . 20
Hacking . . . . . . . . . . . . . . . . . 20
Phreaking . .... Part II of Essay .... . . . 76
APPENDIX B. NEW USER QUESTIONNAIRE FROM A PHREAK/HACK BBS . 77
Introduction
The proliferation of home computers has been accompanied by a corresponding social problem involving the activities of so-called "computer hackers." "Hackers" are computer aficionados who "break in" to corporate and government computer systems using their home computer and a telephone modem. The prevalence of the problem has been dramatized by the media and enforcement agents, and evidenced by the rise of specialized private security firms t ....
Membership Option |
Price |
Join |
30 days (recurring) |
$19.95 |
90 days (recurring) |
$39.95 |
180 days (non-recurring) |
$69.95 |
|
|
|
Words: 10104 - Pages: 37
|